• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于具有受限硬件和开源基础设施的物联网的分布式测量系统安全协议性能分析

A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures.

作者信息

Gentile Antonio Francesco, Macrì Davide, Carnì Domenico Luca, Greco Emilio, Lamonaca Francesco

机构信息

Institute for High-Performance Computing and Networking (ICAR), National Research Council of Italy (CNR), Via P. Bucci 8/9C, 87036 Rende, Italy.

Department of Computer Engineering, Modeling, Electonics and Systems Engineering (DIMES), University of Calabria, Via P. Bucci 39/c, 87036 Rende, Italy.

出版信息

Sensors (Basel). 2024 Apr 26;24(9):2781. doi: 10.3390/s24092781.

DOI:10.3390/s24092781
PMID:38732887
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11086354/
Abstract

The widespread adoption of Internet of Things (IoT) devices in home, industrial, and business environments has made available the deployment of innovative distributed measurement systems (DMS). This paper takes into account constrained hardware and a security-oriented virtual local area network (VLAN) approach that utilizes local message queuing telemetry transport (MQTT) brokers, transport layer security (TLS) tunnels for local sensor data, and secure socket layer (SSL) tunnels to transmit TLS-encrypted data to a cloud-based central broker. On the other hand, the recent literature has shown a correlated exponential increase in cyber attacks, mainly devoted to destroying critical infrastructure and creating hazards or retrieving sensitive data about individuals, industrial or business companies, and many other entities. Much progress has been made to develop security protocols and guarantee quality of service (QoS), but they are prone to reducing the network throughput. From a measurement science perspective, lower throughput can lead to a reduced frequency with which the phenomena can be observed, generating, again, misevaluation. This paper does not give a new approach to protect measurement data but tests the network performance of the typically used ones that can run on constrained hardware. This is a more general scenario typical for IoT-based DMS. The proposal takes into account a security-oriented VLAN approach for hardware-constrained solutions. Since it is a worst-case scenario, this permits the generalization of the achieved results. In particular, in the paper, all OpenSSL cipher suites are considered for compatibility with the Mosquitto server. The most used key metrics are evaluated for each cipher suite and QoS level, such as the total ratio, total runtime, average runtime, message time, average bandwidth, and total bandwidth. Numerical and experimental results confirm the proposal's effectiveness in foreseeing the minimum network throughput concerning the selected QoS and security. Operating systems yield diverse performance metric values based on various configurations. The primary objective is identifying algorithms to ensure suitable data transmission and encryption ratios. Another aim is to explore algorithms that ensure wider compatibility with existing infrastructures supporting MQTT technology, facilitating secure connections for geographically dispersed DMS IoT networks, particularly in challenging environments like suburban or rural areas. Additionally, leveraging open firmware on constrained devices compatible with various MQTT protocols enables the customization of the software components, a crucial necessity for DMS.

摘要

物联网(IoT)设备在家庭、工业和商业环境中的广泛应用,使得创新型分布式测量系统(DMS)的部署成为可能。本文考虑了受限硬件以及一种面向安全的虚拟局域网(VLAN)方法,该方法利用本地消息队列遥测传输(MQTT)代理、用于本地传感器数据的传输层安全(TLS)隧道,以及将TLS加密数据传输到基于云的中央代理的安全套接字层(SSL)隧道。另一方面,最近的文献表明,网络攻击呈指数级增长,主要致力于破坏关键基础设施、制造危害或获取有关个人、工业或商业公司以及许多其他实体的敏感数据。在开发安全协议和保证服务质量(QoS)方面已经取得了很大进展,但它们往往会降低网络吞吐量。从测量科学的角度来看,较低的吞吐量可能导致观察现象的频率降低,再次产生错误评估。本文没有给出保护测量数据的新方法,而是测试了可以在受限硬件上运行的常用方法的网络性能。这是基于物联网的DMS的一种更常见的典型场景。该提议考虑了针对硬件受限解决方案的面向安全的VLAN方法。由于这是最坏的情况,这使得所取得的结果具有普遍性。特别是,在本文中,考虑了所有OpenSSL密码套件与Mosquitto服务器的兼容性。针对每个密码套件和QoS级别评估了最常用的关键指标,如总比率、总运行时间、平均运行时间、消息时间、平均带宽和总带宽。数值和实验结果证实了该提议在预测所选QoS和安全性方面的最小网络吞吐量方面的有效性。操作系统根据各种配置产生不同的性能指标值。主要目标是识别确保合适的数据传输和加密比率的算法。另一个目标是探索确保与支持MQTT技术的现有基础设施具有更广泛兼容性的算法,促进地理上分散的DMS物联网网络的安全连接,特别是在郊区或农村等具有挑战性的环境中。此外,在与各种MQTT协议兼容的受限设备上利用开放固件能够定制软件组件,这是DMS的一项关键需求。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/1f4364329345/sensors-24-02781-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/f1651fe6815a/sensors-24-02781-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/ce748037c7e2/sensors-24-02781-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/9babc2d7e366/sensors-24-02781-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/50b791d042c8/sensors-24-02781-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/964509079efc/sensors-24-02781-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/dcf0ba988dea/sensors-24-02781-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/c73944ab905e/sensors-24-02781-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/776b9093fda9/sensors-24-02781-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/7f3424bab9a7/sensors-24-02781-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/f70d4c45f740/sensors-24-02781-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/0110a532b8ce/sensors-24-02781-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/52d188f9d858/sensors-24-02781-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/ef5d48c74040/sensors-24-02781-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/6e74b2b74fb5/sensors-24-02781-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/3f23f2e57ce1/sensors-24-02781-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/9ae4dce2a0aa/sensors-24-02781-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/1f4364329345/sensors-24-02781-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/f1651fe6815a/sensors-24-02781-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/ce748037c7e2/sensors-24-02781-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/9babc2d7e366/sensors-24-02781-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/50b791d042c8/sensors-24-02781-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/964509079efc/sensors-24-02781-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/dcf0ba988dea/sensors-24-02781-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/c73944ab905e/sensors-24-02781-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/776b9093fda9/sensors-24-02781-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/7f3424bab9a7/sensors-24-02781-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/f70d4c45f740/sensors-24-02781-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/0110a532b8ce/sensors-24-02781-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/52d188f9d858/sensors-24-02781-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/ef5d48c74040/sensors-24-02781-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/6e74b2b74fb5/sensors-24-02781-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/3f23f2e57ce1/sensors-24-02781-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/9ae4dce2a0aa/sensors-24-02781-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e146/11086354/1f4364329345/sensors-24-02781-g017.jpg

相似文献

1
A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures.基于具有受限硬件和开源基础设施的物联网的分布式测量系统安全协议性能分析
Sensors (Basel). 2024 Apr 26;24(9):2781. doi: 10.3390/s24092781.
2
MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices.MUP:借助MQTT简化受限物联网设备的安全空中更新
Sensors (Basel). 2020 Dec 22;21(1):10. doi: 10.3390/s21010010.
3
Mathematical Modeling and Validation of Retransmission-Based Mutant MQTT for Improving Quality of Service in Developing Smart Cities.基于重传的突变 MQTT 的数学建模与验证,用于提高发展中智慧城市的服务质量。
Sensors (Basel). 2022 Dec 12;22(24):9751. doi: 10.3390/s22249751.
4
Secure Enhancement for MQTT Protocol Using Distributed Machine Learning Framework.使用分布式机器学习框架对MQTT协议进行安全增强
Sensors (Basel). 2024 Mar 2;24(5):1638. doi: 10.3390/s24051638.
5
DM-MQTT: An Efficient MQTT Based on SDN Multicast for Massive IoT Communications.DM-MQTT:一种基于 SDN 组播的高效 MQTT 协议,用于大规模物联网通信。
Sensors (Basel). 2018 Sep 12;18(9):3071. doi: 10.3390/s18093071.
6
A Secure IoT-Based Irrigation System for Precision Agriculture Using the Expeditious Cipher.基于快速密码的物联网安全灌溉系统在精准农业中的应用。
Sensors (Basel). 2023 Feb 13;23(4):2091. doi: 10.3390/s23042091.
7
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System.使用物联网入侵检测系统预防MQTT漏洞
Sensors (Basel). 2022 Jan 12;22(2):567. doi: 10.3390/s22020567.
8
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment.物联网系统在 MQTT 环境中的加密密钥分配系统。
Sensors (Basel). 2023 May 26;23(11):5102. doi: 10.3390/s23115102.
9
Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices.时钟频率对节能资源受限物联网设备的高安全性密码套件性能的影响。
Sensors (Basel). 2018 Dec 20;19(1):15. doi: 10.3390/s19010015.
10
BRISK: Dynamic Encryption Based Cipher for Long Term Security.BRISK:基于动态加密的长期安全密码。
Sensors (Basel). 2021 Aug 26;21(17):5744. doi: 10.3390/s21175744.

引用本文的文献

1
Real-Time Monitoring of Energy Contributions in Renewable Energy Communities Through an IoT Measurement System.通过物联网测量系统对可再生能源社区的能源贡献进行实时监测。
Sensors (Basel). 2025 Feb 25;25(5):1402. doi: 10.3390/s25051402.

本文引用的文献

1
Smart Technologies for Water Resource Management: An Overview.智能水资源管理技术:概述。
Sensors (Basel). 2022 Aug 19;22(16):6225. doi: 10.3390/s22166225.
2
A Comprehensive Review on Time Sensitive Networks with a Special Focus on Its Applicability to Industrial Smart and Distributed Measurement Systems.关于时间敏感网络的全面综述,特别关注其在工业智能和分布式测量系统中的适用性。
Sensors (Basel). 2022 Feb 19;22(4):1638. doi: 10.3390/s22041638.